capture0x

capture0x / AdStrike

Public

AdStrike:AI Powered modular Active Directory red-team framework for authorized penetration testing, AD enumeration, attack-path analysis, Kerberos/ADCS workflows, reporting, and operator automation.

10
3
69% credibility
Found May 13, 2026 at 11 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

AdStrike is a menu-driven tool that helps security testers simulate attacks on company networks to find and fix weaknesses.

How It Works

1
๐Ÿ” Discover AdStrike

You find this helpful security testing tool online while learning about protecting company networks.

2
๐Ÿ“ฅ Get it ready

Download and prepare it on your testing computer with a simple setup command.

3
โš™๏ธ Tell it your test target

Enter details like the network address and login info for the pretend company you're testing.

4
๐Ÿš€ Start exploring

Open the colorful menu and pick easy options to scan for weak spots, like checking passwords or user lists.

5
Choose your path
๐Ÿ”
Quick scan

Run basic checks to spot easy problems.

๐Ÿค–
Smart helper

Let the AI guide you through smart next steps.

6
๐Ÿ“Š See the results

Watch as it finds issues and suggests fixes, all in plain reports.

โœ… Test complete

You get a full report of weaknesses found, ready to share with the team to make the network safer.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 11 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is AdStrike?

AdStrike is an AI-powered modular Active Directory red-team framework in Python for authorized penetration testing. It handles AD enumeration, attack-path analysis, Kerberos/ADCS workflows, reporting, and operator automation via a terminal menu spanning 8 kill-chain phases from recon to C2 integration. Operators get shared session state for targets/creds/tickets, tool wrappers, AI planning, and exportable HTML/JSON reports.

Why is it gaining traction?

Its AdStrike:AI agent uses Ollama or Claude for adaptive attack orchestration, while Smart Analyst parses loot to prioritize pathsโ€”saving hours on manual triage. Modular active directory coverage includes coercion relays, RBCD chains, and hybrid Entra attacks, with Kerberos managers for NTLM-disabled setups. Devs dig the auto-discovery, health checks, and one-command flows over juggling Impacket/NetExec solo.

Who should use this?

Red-team operators and pentesters targeting enterprise AD environments during authorized assessments. Perfect for chaining enumeration to persistence in Kerberos-heavy or Azure-hybrid domains, or training teams on full attack paths without tool sprawl.

Verdict

Promising research build for labs/CTFs (10 stars, 0.7% credibility score)โ€”menu-driven automation shines, but lacks prod hardening. Grab for pentest scripting; validate outputs manually until matured.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.